As technology as improved, we’ve added more and more functionality to our security gateways. In this video, you’ll learn about unified threat management appliances and the functionality they bring to securing our network resources.
If you need to identify and stop network, operating system, and application vulnerabilities, then you’ll probably want to consider an IDS or IPS. In this video, you’ll learn about intrusion identification technologies and how they are used to prevent the exploit of vulnerabilities.
The network is a constantly moving river of information, and it may be necessary to occasionally test the water as it flows by. In this video module, you’ll learn the reasons for scanning your network and the different technologies available to gather information. We’ll also dive into packet analyzers, intrusion detection systems, intrusion prevention systems, and port scanners.
Not all network devices are common in every environment. In this video you’ll learn about specialized network devices that go beyond the capabilities of traditional networks such as content switches, IDS/IPS, load balancers, bandwidth shapers, proxy servers, and more.